US8607338B2 - Malicious advertisement management - Google Patents
Malicious advertisement management Download PDFInfo
- Publication number
- US8607338B2 US8607338B2 US12/535,514 US53551409A US8607338B2 US 8607338 B2 US8607338 B2 US 8607338B2 US 53551409 A US53551409 A US 53551409A US 8607338 B2 US8607338 B2 US 8607338B2
- Authority
- US
- United States
- Prior art keywords
- advertisement
- active time
- behavioral characteristics
- malicious
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Definitions
- Malicious online advertisements continue to present problems, including problems for advertising networks, such as Web portals including search engines and search engine providers, as well as for users who receive the advertisements.
- advertising networks such as Web portals including search engines and search engine providers
- Designers of malicious advertisements are motivated and skilled at creating malicious advertisements that are difficult to detect.
- malicious advertisements have cropped up that behave normally for a period of time, but are set to, or can be triggered to, change their behavior at a later time.
- Such advertisements may pass editorial in their initial form, but may essentially morph into something different and dangerous, or may change their behavior and behave maliciously, at a later time, which may be during active serving.
- Some such advertisements may even change back and forth from a non-malicious state to a malicious state multiple times, further confounding detection efforts.
- Some embodiments of the invention provide methods and systems for managing malicious advertisements, including threats or risks posed by malicious advertisements or potentially malicious or risky advertisements. Methods are provided in which an advertisement is tested to determine behavioral characteristics at a non-active time and at an active time, and the two sets of characteristics are compared. If a difference is determined to exist, an action is taken that reflects a higher chance of the advertisement being malicious than if no difference was detected.
- the nature, type, or degree of difference is considered in determining the degree of risk that the advertisement is malicious or in determining an action to take with respect to managing the risk.
- testing can involve conduct such as isolation, simulation, analysis, debugging, and other conduct.
- testing can include sampling the advertisement at an active time, and performing simulation or testing on the sampled advertisement.
- the testing can include running the advertisement on a virtual machine, or in a sandbox environment, to allow gathering of further information regarding the advertisement.
- a set of behavioral characteristics associated with the advertisement at a non-active time may be used in determining a level of risk associated with an advertisement.
- Riskier advertisements may later be subjected to a higher degree of scrutiny with respect to being malicious, which can include, for example, more frequent or more intense testing at times at which the advertisement is active.
- Other factors directly or indirectly associated with the advertisement may also be included in making the determination, including, for example, the reliability, track record, or reputation of the advertisement or the advertisement provider.
- FIG. 1 is a distributed computer system according to one embodiment of the invention.
- FIG. 2 is a conceptual block diagram illustrating one embodiment of the invention
- FIG. 3 is a flow diagram of a method according to one embodiment of the invention.
- FIG. 4 is a flow diagram of a method according to one embodiment of the invention.
- the invention provides methods and systems for managing malicious advertisements, including threats or risks posed by malicious advertisements or potentially malicious or risky advertisements.
- Methods are provided in which an advertisement is tested to determine behavioral characteristics at a non-active time and at an active time, and the two sets of characteristics are compared. If a difference is determined to exist, an action is taken that reflects a higher chance of the advertisement being malicious than if no difference was detected.
- testing may be preformed repetitively or periodically when the advertisement is in an active mode.
- the nature, type, or degree of difference is considered in determining a degree of risk that the advertisement is malicious or in determining an action to take with respect to managing the risk.
- testing can include sampling the advertisement at an active time, and performing simulation or testing on the sampled advertisement.
- the testing can include running the advertisement on a virtual machine, or in a sandbox environment, to allow gathering of further information regarding the advertisement.
- appropriate action may be taken, which may include suspension or termination of the advertisement if the risk is determined to be sufficiently high, reinstating the advertisement if the risk is determined to be sufficiently low, or performing further testing if determined to be necessary or appropriate.
- FIG. 1 is a distributed computer system 100 according to one embodiment of the invention.
- the system 100 includes user computers 104 , advertiser computers 106 and server computers 108 connected or connectable to the Internet 102 .
- the Internet 102 is depicted, the invention contemplates other embodiments in which the Internet is not included, as well as embodiments in which other networks are included in addition to the Internet, including one more wireless networks, WANs, LANs, telephone, cell phone, or other data networks, etc.
- the invention further contemplates embodiments in which user computers or other computers may be or include a wireless, portable, or handheld devices such as cell phones, PDAs, etc.
- Each of the one or more computers 104 , 106 , 108 may be distributed, and can include various hardware, software, applications, programs and tools. Depicted computers may also include a hard drive, monitor, keyboard, pointing or selecting device, etc. The computers may operate using an operating system such as Windows by Microsoft, etc. Each computer may include a central processing unit (CPU), data storage device, and various amounts of memory including RAM and ROM. Depicted computers may also include various programming, applications, and software to enable searching, search results, and advertising, such as keyword searching and advertising in a sponsored search context. As depicted, each of the server computers 108 includes one or more CPUs 110 and a data storage device 112 .
- the data storage device 112 includes one or more databases 118 , as well a malicious advertisement management program 114 .
- the malicious advertisement management program 114 is intended to broadly include programming, algorithms, applications, software, graphical user interfaces, models, and other tools or procedures necessary to implement or facilitate methods and systems according to embodiments of the invention, or computerized aspects thereof, whether on one computer or distributed among multiple computers or devices.
- the elements of the advertisement management program 114 may exist on one computer, or may exist on multiple computers, devices, or locations.
- the server computers 108 may be part of an advertisement exchange.
- advertisement exchanges may virtually connect parties including advertisers, publishers, networks of advertisers, networks of publishers, and other entities.
- the exchange may facilitate arrangements, bidding, auctioning in connection with advertisements and advertisement campaigns, and may also facilitate planning and serving of advertisements.
- Advertisements that may be included within the exchange can include display or graphical advertisements that are not served in connection with user searches including keyword-based searches.
- the exchange may also include sponsored search advertisements, including advertisements served in association with user searches, such as keyword searches. Any type of simple or sophisticated advertisements may be included, such as picture, video and audio advertisements, streaming advertisements, interactive advertisements, rich media advertisements, etc.
- active advertisements are advertisements that are available for serving on or in connection with the exchange, whereas non-active advertisements are not so available.
- non-active advertisements can include advertisements that are in review prior to be available for serving. This can include review as part of an editorial process to try to ensure or reduce the chance that inappropriate or dangerous advertisements are not allowed to be active.
- FIG. 2 is a conceptual block diagram 200 illustrating one embodiment of the invention.
- Block 202 represents a party that supplies an advertisement, represented by block 204 , intended for eventually being available for serving to users through an advertisement network.
- Block 202 can be, for example, an advertiser, or a party acting on behalf or at least partially in the role of, an advertiser.
- Block 202 represents an advertisement supplied by the advertiser or other entity.
- the term “advertisement” is intended to broadly include all code, programming, software, or the like, that can be considered to be part of or an aspect of the advertisement.
- Block 206 represents the advertisement after it enters an editorial process, which may be conducted by an advertisement network or partner thereof. Generally, the editorial process takes place prior to the advertisement becoming active, or available for serving.
- the advertisement may be tested to determine behavioral characteristics associated with it.
- characteristics can include a tendency or ability to engage in particular actions or types of actions.
- Such characteristics or actions can include, for example, accessing resources or types of resources, modifying, adding, deleting, moving, inserting, or injecting anything on a system such as an ad exchange, user computer, or other computer, downloading or uploading files, causing navigational changes or redirects, allowing or providing access by another resource or computer, storing information, and many other possible activities or conduct or potential conduct.
- block 208 can include establishing, based at least in part on determined behavioral characteristics of the advertisement as determined in a non-active mode, a behavioral “fingerprint”.
- the behavioral fingerprint can provide a baseline behavioral characteristic pattern for the advertisement at a non-active time.
- Arrow 210 represents storing of behavioral characteristic information, which may include the fingerprint, such as in a database 215 .
- the non-active advertisement behavioral fingerprint may be used in assessing, estimating, or determining a degree of risk associated with the advertisement, such as a degree of risk that the advertisement may be malicious. For example, certain characteristics, or combinations or characteristics, may be associated with a greater chance that the advertisement may be malicious, even if it is not clear at that time that the advertisement is actually malicious.
- the degree or level of risk may be used in determining or gauging other activities associated with managing the risk, or identifying the advertisement as malicious. For example, a higher degree of risk may indicate, lead to or make appropriate a greater degree of scrutiny after the advertisement has gone active, such as an increased frequency of testing, more or different testing, or intense testing.
- a sufficiently risky fingerprint may in some cases alone lead to not allowing the advertisement to become active at all, or not allowing the advertisement to become active until after further testing and clearance.
- Block 216 represents the advertisement after it has gone into an active mode, and is available for serving to users, such as after it has passed or been cleared through an editorial process.
- Active mode can include the advertisement being available to or within an advertisement exchange.
- advertisement exchange is depicted as circle 214 .
- the advertisement 216 is tested, or sampled and tested, and its behavioral characteristics are determined, as represented by block 212 .
- the set of characteristics so determined may then be stored, such as in the database 215 , as indicated by arrow 213 .
- Block 218 represents comparison of the set two sets of behavioral characteristics, one set determined when the advertisement is non-active, and the other set determined when the advertisement is active.
- advertisements whose behavioral characteristics change may pose a greater risk of being malicious.
- the advertisement is managed based on a lower level of risk, whereas, as represented by block 222 , if they are different, then the advertisement is managed based on a higher level risk.
- periodic or repetitive testing is performed on active advertisements, as indicated, for example, by arrow 224 .
- the advertisement is sampled from the ad exchange 214 , tested, and its set of behavioral characteristics are compared with that of the advertisement at a non-active time. In some embodiments, this process is repeated periodically, until and unless a change is detected, at which time conduct may be undertaken that reflects a determination that there is an increased chance that the advertisement is malicious.
- active advertisements may be sampled and tested periodically, and their determined behavioral characteristics compared with those of the advertisement as determined when the advertisement was in a non-active state.
- the nature, frequency or intensity of testing is based at least in part on a risk assessment associated with the set of characteristics determined when the advertisement was in a non-active state.
- testing or other action that is taken may vary according to the nature, degree, number, or specific set, combination or pattern of differences. Testing can broadly include any of a number of activities, including activities that may shed light on the nature of the advertisement, its risk or likelihood of being malicious, whether or not it actually is malicious, or exactly what it may do, how it may do it, or the specifics or details associated with such activities, that may be considered malicious.
- testing may include analysis or simulation of serving to a user computer, such as running the advertisement on a virtual machine, or in a sandbox environment, such as to assess, understand, and record its behavior in a controlled, safe, easy to analyze, efficient and controllably variable set of circumstances.
- FIG. 3 is a flow diagram of a method 300 according to one embodiment of the invention.
- the advertisement is tested at a non-active time, and behavioral characteristics of the advertisement are determined and stored in a database 304 .
- the advertisement is tested at an active time, and behavioral characteristics of the advertisement are determined and stored in a database 304 or another database or other storage.
- step 308 it is queried whether the characteristics of the advertisement determined when the advertisement was non-active differ from the characteristics of the advertisement determined when the advertisement was active.
- the advertisement may be allowed to remain active without follow-on testing or immediate follow-on testing.
- the advertisement is more likely to be malicious, and conduct proceeds accordingly.
- the advertisement may be removed from being active, or may be subject to further testing or more frequent or intense testing.
- FIG. 4 is a flow diagram of a method 400 according to one embodiment of the invention.
- an advertisement is tested at a non-active time to obtain a first set of information identifying a first set of behavioral characteristics associated with the advertisement, a non-active time being a time during which the advertisement is not available for serving to users.
- the first set of information is stored, such as in a database.
- the advertisement is tested at an active time to identify a second set of behavioral characteristics associated with the advertisement, an active time being a time at which the advertisement is available for serving to users.
- the second set of information is stored, such as in a database.
- the first set of information is compared with the second set of information to determine at least whether there is a difference between the behavioral characteristics of the advertisement at the non-active time and the behavioral characteristics of the advertisement at the active time.
- a third set of information is stored at least identifying the determination of at least whether there is a difference.
- step 414 if it is determined that there is a difference between the behavioral characteristics of the advertisement at the non-active time and the behavioral characteristics of the advertisement at the active time, then at least one action is conducted reflecting a determination that the advertisement is more likely to be malicious than if it had been determined that there is not a difference between the behavioral characteristics of the advertisement at the non-active time and the behavioral characteristics of the advertisement at the active time.
Abstract
Description
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/535,514 US8607338B2 (en) | 2009-08-04 | 2009-08-04 | Malicious advertisement management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/535,514 US8607338B2 (en) | 2009-08-04 | 2009-08-04 | Malicious advertisement management |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110035800A1 US20110035800A1 (en) | 2011-02-10 |
US8607338B2 true US8607338B2 (en) | 2013-12-10 |
Family
ID=43535785
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/535,514 Expired - Fee Related US8607338B2 (en) | 2009-08-04 | 2009-08-04 | Malicious advertisement management |
Country Status (1)
Country | Link |
---|---|
US (1) | US8607338B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8977948B1 (en) * | 2012-05-14 | 2015-03-10 | Amdocs Software Systems Limited | System, method, and computer program for determining information associated with an extracted portion of content |
US11861657B1 (en) | 2010-12-22 | 2024-01-02 | Alberobello Capital Corporation | Identifying potentially unfair practices in content and serving relevant advertisements |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130160120A1 (en) * | 2011-12-20 | 2013-06-20 | Yahoo! Inc. | Protecting end users from malware using advertising virtual machine |
EP2901290A4 (en) * | 2012-09-25 | 2016-04-20 | Checkmarx Ltd | Detecting malicious advertisements using source code analysis |
JP6023104B2 (en) * | 2014-02-06 | 2016-11-09 | ヤフー株式会社 | Distribution apparatus, distribution method, distribution program, facility apparatus, and distribution system |
JP5986120B2 (en) * | 2014-02-06 | 2016-09-06 | ヤフー株式会社 | Distribution apparatus, distribution method, distribution program, facility apparatus, and distribution system |
US9720889B1 (en) * | 2014-07-10 | 2017-08-01 | Google Inc. | Systems and methods for detecting auto-redirecting online content |
EP3401827A1 (en) | 2017-05-10 | 2018-11-14 | Checkmarx Ltd. | Method and system of static and dynamic data flow analysis |
US11399033B2 (en) * | 2019-06-25 | 2022-07-26 | Mcafee, Llc | Malicious advertisement protection |
US11836258B2 (en) | 2020-07-28 | 2023-12-05 | Checkmarx Ltd. | Detecting exploitable paths in application software that uses third-party libraries |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050283836A1 (en) * | 2004-06-21 | 2005-12-22 | Chris Lalonde | Method and system to detect externally-referenced malicious data for access and/or publication via a computer system |
US20080243602A1 (en) | 2007-03-28 | 2008-10-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods for providing iptv advertisements |
US20090055651A1 (en) * | 2007-08-24 | 2009-02-26 | Bernd Girod | Authenticated media communication system and approach |
US20090094175A1 (en) | 2007-10-05 | 2009-04-09 | Google Inc. | Intrusive software management |
US20090287653A1 (en) * | 2008-05-13 | 2009-11-19 | Bennett James D | Internet search engine preventing virus exchange |
US20090327084A1 (en) | 2008-02-14 | 2009-12-31 | SiteScout Corporation | Graphical certifications of online advertisements intended to impact click-through rates |
US20090327849A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Link Classification and Filtering |
US20100037305A1 (en) * | 2008-08-08 | 2010-02-11 | Yahoo!, Inc. | Window overlay for online collaboration platform |
US20100235831A1 (en) * | 2009-03-12 | 2010-09-16 | Arend Erich Dittmer | Method for dynamic configuration of virtual machine |
US20100250397A1 (en) * | 2009-03-24 | 2010-09-30 | Gregory Ippolito | Internet Retail Sales Method and System Using Third Party Web Sites |
US20100281083A1 (en) * | 2009-05-04 | 2010-11-04 | Moka5, Inc. | Policy-based layered filesystem management |
US20110047618A1 (en) * | 2006-10-18 | 2011-02-24 | University Of Virginia Patent Foundation | Method, System, and Computer Program Product for Malware Detection, Analysis, and Response |
-
2009
- 2009-08-04 US US12/535,514 patent/US8607338B2/en not_active Expired - Fee Related
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050283836A1 (en) * | 2004-06-21 | 2005-12-22 | Chris Lalonde | Method and system to detect externally-referenced malicious data for access and/or publication via a computer system |
US20110047618A1 (en) * | 2006-10-18 | 2011-02-24 | University Of Virginia Patent Foundation | Method, System, and Computer Program Product for Malware Detection, Analysis, and Response |
US20080243602A1 (en) | 2007-03-28 | 2008-10-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods for providing iptv advertisements |
US20090055651A1 (en) * | 2007-08-24 | 2009-02-26 | Bernd Girod | Authenticated media communication system and approach |
US20090094175A1 (en) | 2007-10-05 | 2009-04-09 | Google Inc. | Intrusive software management |
US20090094697A1 (en) * | 2007-10-05 | 2009-04-09 | Google Inc. | Intrusive software management |
US20090327084A1 (en) | 2008-02-14 | 2009-12-31 | SiteScout Corporation | Graphical certifications of online advertisements intended to impact click-through rates |
US20090287653A1 (en) * | 2008-05-13 | 2009-11-19 | Bennett James D | Internet search engine preventing virus exchange |
US20090327849A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Link Classification and Filtering |
US20100037305A1 (en) * | 2008-08-08 | 2010-02-11 | Yahoo!, Inc. | Window overlay for online collaboration platform |
US20100235831A1 (en) * | 2009-03-12 | 2010-09-16 | Arend Erich Dittmer | Method for dynamic configuration of virtual machine |
US20100250397A1 (en) * | 2009-03-24 | 2010-09-30 | Gregory Ippolito | Internet Retail Sales Method and System Using Third Party Web Sites |
US20100281083A1 (en) * | 2009-05-04 | 2010-11-04 | Moka5, Inc. | Policy-based layered filesystem management |
Non-Patent Citations (1)
Title |
---|
U.S. Appl. No. 12/699,402, filed Feb. 3, 2010, Faizal Atcha. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11861657B1 (en) | 2010-12-22 | 2024-01-02 | Alberobello Capital Corporation | Identifying potentially unfair practices in content and serving relevant advertisements |
US8977948B1 (en) * | 2012-05-14 | 2015-03-10 | Amdocs Software Systems Limited | System, method, and computer program for determining information associated with an extracted portion of content |
Also Published As
Publication number | Publication date |
---|---|
US20110035800A1 (en) | 2011-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8607338B2 (en) | Malicious advertisement management | |
CN110442712B (en) | Risk determination method, risk determination device, server and text examination system | |
WO2018192496A1 (en) | Trend information generation method and device, storage medium and electronic device | |
Mendoza et al. | Bots in social and interaction networks: detection and impact estimation | |
KR20140016278A (en) | Sponsored stories unit creation from organic activity stream | |
US9922129B2 (en) | Systems and methods for cluster augmentation of search results | |
US20210209624A1 (en) | Online platform for predicting consumer interest level | |
JP2003523578A (en) | System and method for determining the validity of an interaction on a network | |
CN104836781A (en) | Method distinguishing identities of access users, and device | |
FR3025909A3 (en) | VIDEO AUDIT ON THE WEB | |
CN112101994A (en) | Member rights management method, member rights management device, computer equipment and readable storage medium | |
CN109376534B (en) | Method and apparatus for detecting applications | |
US20150287101A1 (en) | Performance based approval in cms workflow process | |
US10628510B2 (en) | Web link quality analysis and prediction in social networks | |
CN102982048A (en) | Method and device for assessing junk information mining rule | |
JP2017535866A (en) | Offline evaluation of ranking functions | |
US20140351271A1 (en) | Measuring participation in content propagation across a dynamic network topology | |
US20140365571A1 (en) | Automatically Determining Veracity of Documents Posted in a Public Forum | |
CN107911447A (en) | Operation system expansion method and device | |
CN112287339A (en) | APT intrusion detection method and device and computer equipment | |
WO2012129102A2 (en) | Detection and analysis of backlink activity | |
US20130246160A1 (en) | System and method for conducting randomized trails on ad exchanges | |
US20230017558A1 (en) | Systems and methods for detecting data leakage of online content | |
US20160027025A1 (en) | Systems and methods of counting unique interactions between users of a software application | |
US20130339158A1 (en) | Determining legitimate and malicious advertisements using advertising delivery sequences |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ATCHA, FAIZAL;REEL/FRAME:023051/0358 Effective date: 20090731 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: EXCALIBUR IP, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038383/0466 Effective date: 20160418 |
|
AS | Assignment |
Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:038951/0295 Effective date: 20160531 |
|
AS | Assignment |
Owner name: EXCALIBUR IP, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038950/0592 Effective date: 20160531 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ACACIA RESEARCH GROUP LLC;AMERICAN VEHICULAR SCIENCES LLC;BONUTTI SKELETAL INNOVATIONS LLC;AND OTHERS;REEL/FRAME:052853/0153 Effective date: 20200604 |
|
AS | Assignment |
Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:053459/0059 Effective date: 20200428 |
|
AS | Assignment |
Owner name: STINGRAY IP SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: LIMESTONE MEMORY SYSTEMS LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: SAINT LAWRENCE COMMUNICATIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: PARTHENON UNIFIED MEMORY ARCHITECTURE LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: ACACIA RESEARCH GROUP LLC, NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: NEXUS DISPLAY TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: LIFEPORT SCIENCES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: UNIFICATION TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: MOBILE ENHANCEMENT SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: AMERICAN VEHICULAR SCIENCES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: MONARCH NETWORKING SOLUTIONS LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: TELECONFERENCE SYSTEMS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: SUPER INTERCONNECT TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: CELLULAR COMMUNICATIONS EQUIPMENT LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: BONUTTI SKELETAL INNOVATIONS LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 Owner name: INNOVATIVE DISPLAY TECHNOLOGIES LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254 Effective date: 20200630 |
|
AS | Assignment |
Owner name: R2 SOLUTIONS LLC, TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED ON REEL 053654 FRAME 0254. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST GRANTED PURSUANT TO THE PATENT SECURITY AGREEMENT PREVIOUSLY RECORDED;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:054981/0377 Effective date: 20200630 |
|
AS | Assignment |
Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 052853 FRAME: 0153. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:R2 SOLUTIONS LLC;REEL/FRAME:056832/0001 Effective date: 20200604 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20211210 |